1. Gonzalez, F.: A study of artificial immune systems applied to anomaly detection, Ph.D. dissertation, University of Memphis (2003)
2. Yeung, D.Y., Ding, Y.: Host-based intrusion detection using dynamic and static behavioral models. Pattern Recogn. 36(1), 229–243 (2003)
3. Greensmith, J.: Dendritic cell algorithm, Ph.D. dissertation, School of Computer Science, Univ. Nottingham, Nottingham, U.K. (2007)
4. Asuncion, A., Newman, D.: UCI machine learning repository (2007).
http://archive.ics.uci.edu/ml/
5. Greensmith, J., Aickelin, U., Tedesco, G.: Information fusion for anomaly detection with the dendritic cell algorithm. Inf. Fusion 11, 21–34 (2010)